General
-
Target
BOSSARD_ORDER_4923521.zip
-
Size
657KB
-
Sample
240926-mydc3awfqd
-
MD5
b3eb10d7a99084b39e0e1de2210adcb8
-
SHA1
2d2bc41cc7980f0dc4430f8353d310e5b32efcbb
-
SHA256
7ec499541fb4b5c295cb3c9796e6b00fecb2462daf773a8ae4745303ebb9135f
-
SHA512
b69cc345861278b567e27c8aa800c38eee436fd728cda3d9f952a38b1e8e96e6d4e84a9ebd239598f81ef34ab8b3f517502fbedb374db8f624687f0b8f0b5b41
-
SSDEEP
12288:yOl1e8B93VGKe3GhEcJLZ0+uECVcnYZzHm5fLVAymwIL7+dx2eVH:P1ekA3+IVcn2zGdJsHM2eVH
Static task
static1
Behavioral task
behavioral1
Sample
BOSSARD_ORDER_4923521.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
manlikeyou88 - Email To:
[email protected]
Targets
-
-
Target
BOSSARD_ORDER_4923521.exe
-
Size
853KB
-
MD5
a9ea323ea2de4868acfb99b7959b54b6
-
SHA1
b66217db6ffda157a9252611f6b1d528f76f0420
-
SHA256
e17765cd72f6b95c8167f428ed734688d3b545c45c23e07407361e8979b49167
-
SHA512
eff66d932ba7d246b20fe71da264ecbabb430d27bec97bbe258f0b4ca6a43843426f5251579b444ae5fd02fbcf8d9ee8cb9030c7e7c20727bb36e813e1b3117f
-
SSDEEP
12288:27auaN1gTyQcG+yDXEdKemm6EIJtZcIuE4VGnYZzHmPKuDVFSrdtTJHlgrdm4Vzu:27sQclMXk6OVGn2zGS6VAd
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1